Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: White House
White House technology officials could barely contain their enthusiasm. They said it was "terrific" that Twitter is supporting the new Do Not Track feature in web browsers. With just one clickm tweeters could stop Twitter from tracking the websites they visit.
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
The administration has tried to get in front of the debate over the information sharing aspects of one of the cybersecurity bills up for debate in the House Thursday. Democratic lawmakers and industry groups expressed concern over the Cyber Intelligence Sharing and Protection Act (CISPA) arguing its provisions on what information is to be shared and with whom are too broad.
Tags: technology , Mike Rogers , Dutch Ruppersberger , cybersecurity , information sharing , Critical infrastructure protection , Congress , House , Senate , Cyber Intelligence Sharing and Protection Act , Jason Miller
The Army and DISA will release a broad agency announcement this summer seeking third party software to secure smartphones and tablet computers. The Marine Corps is looking at host of different possibilities to secure mobile devices, including a process to verify the software code in apps.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
Howard Schmidt, on his blog, lists the areas for improvement within federal cybersecurity.
A new Internet Botnet Group will bring together federal and industry experts to try to stem the tide against botnet attacks. Experts estimate one in 10 computers are controlled by bad actors using malicious software to attack organizations. FCC working groups released three reports with recommendations for improve cybersecurity.
Tags: technology , Miriam Perlberg , Julius Genachowski , FCC , NIST , National Security Council , cybersecurity , botnets , Steve Crocker , Shinkuro , Messaging Anti-Abuse Working Group , Communications, Security, Reliability and Interoperability Council , DNSSEC , Jason Miller
Lawmakers weigh public's right to know against the need to protect cyber secrets. Sen. Patrick Leahy's (D-Vt.) provision in 2012 Defense authorization bill tightens the definition of "exemptions," but he questions the need for further rules to give agencies power to withhold information.
Tags: Sunshine Week , transparency , open government , Congress , FOIA , Senate Judiciary Committee , Patrick Leahy , Charles Grassley , Paul Rosenzweig , Jerry Ensminger , Melanie Pustay , Kenneth Bunting , National Freedom of Information Coalition , Jared Serbu , DOJ , Barack Obama , Navy , DoD , management
White House officials were in close contact with the Agriculture Department in the hours leading up to Agriculture Secretary Tom Vilsack's decision to fire USDA employee Shirley Sherrod in 2010, according to administration emails.